- Mastering Reverse Engineering
- Reginald Wong
- 146字
- 2021-06-10 19:40:19
Seeking approval
Ethics requires anyone carrying out reverse engineering of software to have approval from the owner of the software. However, there are a lot of instances where software shows its bugs upfront, while the operating system reports it. Some companies are more lenient about their software getting reversed without approval, but it is customary today that any vulnerabilities found should be reported directly to the owner and not publicized. It is up to the owner to decide when to report the vulnerability to the community. This prevents attackers from using a vulnerability before a software patch gets released.
It is a different story when malware or hacking is involved. Of course, reversing malware doesn't need approval from the malware author. Rather, one of the goals of malware analysis is to catch the author. If not sure, always consult a lawyer or a company's legal department.
- CTF實戰(zhàn):技術、解題與進階
- 工業(yè)互聯(lián)網(wǎng)安全
- API安全實戰(zhàn)
- 模糊測試:強制發(fā)掘安全漏洞的利器
- 學電腦安全與病毒防范
- API安全技術與實戰(zhàn)
- 物聯(lián)網(wǎng)安全滲透測試技術
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 數(shù)據(jù)安全架構設計與實戰(zhàn)
- VMware vCloud Security
- Mastering Metasploit
- 數(shù)據(jù)恢復技術深度揭秘
- Hands-On Bug Hunting for Penetration Testers
- 網(wǎng)絡對抗的前世今生
- 精通Metasploit滲透測試(第3版)